{"id":"https://openalex.org/W4297909887","doi":"https://doi.org/10.1145/3061639.3062293","title":"On Mitigation of Side-Channel Attacks in 3D ICs","display_name":"On Mitigation of Side-Channel Attacks in 3D ICs","publication_year":2017,"publication_date":"2017-06-13","ids":{"openalex":"https://openalex.org/W4297909887","doi":"https://doi.org/10.1145/3061639.3062293"},"language":"en","primary_location":{"id":"doi:10.1145/3061639.3062293","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3061639.3062293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 54th Annual Design Automation Conference 2017","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1710.02678","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052751303","display_name":"Johann Knechtel","orcid":"https://orcid.org/0000-0001-5093-2939"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Johann Knechtel","raw_affiliation_strings":["Electrical and Computer Engineering, New York University Abu Dhabi (NYUAD), United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, New York University Abu Dhabi (NYUAD), United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059987567","display_name":"Ozgur Sinanoglu","orcid":"https://orcid.org/0000-0003-0782-0397"},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ozgur Sinanoglu","raw_affiliation_strings":["Electrical and Computer Engineering, New York University Abu Dhabi (NYUAD), United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, New York University Abu Dhabi (NYUAD), United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052751303"],"corresponding_institution_ids":["https://openalex.org/I120250893"],"apc_list":null,"apc_paid":null,"fwci":1.1577,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.81372435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8276954889297485},{"id":"https://openalex.org/keywords/floorplan","display_name":"Floorplan","score":0.8150746822357178},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8039648532867432},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6163808107376099},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5956170558929443},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48926302790641785},{"id":"https://openalex.org/keywords/thermal","display_name":"Thermal","score":0.4877370297908783},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.48001593351364136},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.44146138429641724},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4233202040195465},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3908924460411072},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.38773220777511597},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.3278389573097229},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.26933014392852783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20622804760932922},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19499161839485168},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1621556580066681},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16198298335075378}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8276954889297485},{"id":"https://openalex.org/C130145326","wikidata":"https://www.wikidata.org/wiki/Q1553985","display_name":"Floorplan","level":2,"score":0.8150746822357178},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8039648532867432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6163808107376099},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5956170558929443},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48926302790641785},{"id":"https://openalex.org/C204530211","wikidata":"https://www.wikidata.org/wiki/Q752823","display_name":"Thermal","level":2,"score":0.4877370297908783},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.48001593351364136},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.44146138429641724},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4233202040195465},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3908924460411072},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.38773220777511597},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3278389573097229},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26933014392852783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20622804760932922},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19499161839485168},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1621556580066681},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16198298335075378},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3061639.3062293","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3061639.3062293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 54th Annual Design Automation Conference 2017","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1710.02678","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1710.02678","pdf_url":"https://arxiv.org/pdf/1710.02678","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1710.02678","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1710.02678","pdf_url":"https://arxiv.org/pdf/1710.02678","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W618969213","https://openalex.org/W1531312210","https://openalex.org/W1939710494","https://openalex.org/W2061587924","https://openalex.org/W2084169508","https://openalex.org/W2095410905","https://openalex.org/W2102694790","https://openalex.org/W2105674717","https://openalex.org/W2115200566","https://openalex.org/W2146842153","https://openalex.org/W2183849663","https://openalex.org/W2216890204","https://openalex.org/W2292869843","https://openalex.org/W2308963902","https://openalex.org/W2318649003","https://openalex.org/W2319855067","https://openalex.org/W2320552075","https://openalex.org/W2344689375","https://openalex.org/W2402794349","https://openalex.org/W2493084514","https://openalex.org/W2549387826","https://openalex.org/W2581035600","https://openalex.org/W2585270607","https://openalex.org/W2951458793","https://openalex.org/W2953223508","https://openalex.org/W3139938843","https://openalex.org/W4394877124","https://openalex.org/W6697136846","https://openalex.org/W6764559135"],"related_works":["https://openalex.org/W2055008360","https://openalex.org/W2135118255","https://openalex.org/W215057456","https://openalex.org/W1500063550","https://openalex.org/W2106366463","https://openalex.org/W1535718467","https://openalex.org/W2165891825","https://openalex.org/W2942050196","https://openalex.org/W4214838992","https://openalex.org/W2922420188"],"abstract_inverted_index":{"Various":[0],"side-channel":[1],"attacks":[2],"(SCAs)":[3],"on":[4,28,59,85],"ICs":[5,42,83],"have":[6,43],"been":[7,44],"successfully":[8],"demonstrated":[9],"and":[10,57,65,73,94,108,122,131],"also":[11],"mitigated":[12],"to":[13,101,138],"some":[14],"degree.":[15],"In":[16,48],"the":[17,62,78,104,116],"context":[18],"of":[19,31,61,71,106],"3D":[20,41,82,112],"ICs,":[21,113],"however,":[22],"prior":[23],"art":[24],"has":[25],"mainly":[26],"focused":[27],"efficient":[29],"implementations":[30],"classical":[32],"SCA":[33],"countermeasures.":[34],"That":[35],"is,":[36],"SCAs":[37,130],"tailored":[38,90],"for":[39,92],"up-and-coming":[40],"overlooked":[45],"so":[46],"far.":[47],"this":[49],"paper,":[50],"we":[51,127],"conduct":[52],"such":[53],"a":[54],"novel":[55],"study":[56],"focus":[58],"one":[60],"most":[63],"accessible":[64],"critical":[66],"side":[67],"channels:":[68],"thermal":[69,79,95,117],"leakage":[70,80],"activity":[72,123],"power":[74,93,121],"patterns.":[75,124],"We":[76],"address":[77],"in":[81,111],"early":[84],"during":[86],"floorplanning,":[87],"along":[88],"with":[89],"extensions":[91],"management.":[96],"Our":[97],"key":[98],"idea":[99],"is":[100],"carefully":[102],"exploit":[103],"specifics":[105],"material":[107],"structural":[109],"properties":[110],"thereby":[114],"decorrelating":[115],"behaviour":[118],"from":[119],"underlying":[120],"Most":[125],"importantly,":[126],"discuss":[128],"powerful":[129],"demonstrate":[132],"how":[133],"our":[134],"open-source":[135],"tool":[136],"helps":[137],"mitigate":[139],"them.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2022-10-01T00:00:00"}
